[Solution]Topic: CYBERSECURITY MANAGEMENT II – TACTICAL

REQUIREMENTS Your submission must be your original work. No more than a combined total of 30% of a submission and no more than a 10%…

REQUIREMENTS
Your submission must be your original work. No more than a combined total of 30% of a submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. An originality report is provided when you submit your task that can be used as a guide.
 
You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.
 
Introduction
 

  Summarize the events that lead to the discovery of the potential vulnerability. Record your summary in the attached “NOC Reporting Template.”

 
Vulnerability Scan
 

  Run the vulnerability scanning tool to confirm the presence of any vulnerabilities and provide the complete scan outputs as Appendix A in the attached “NOC Reporting Template.”

 
Scan Summary
 

  Summarize the results of the vulnerability scans and intrusion alarms, including which systems and data were compromised. Be sure to address the basic assessment questions from the attached “Incident Response Plan” as part of your submission. Record your responses in the attached “NOC Reporting Template.”

 
Detailed Analysis
 

  Explain the steps taken to identify any exploited systems and data that are included in the scope of the incident. Provide screenshots of specific examples within the logs, illustrating your findings as part of your documentation in the attached “NOC Reporting Template.”  The screenshots should be taken within the lab environment and will include your name.

 
Scan Response
 

  Identify the event level of the incident, who needs to be contacted, and when should they be contacted based on the company’s incident response plan. Record your responses in the attached “NOC Reporting Template.”

 
Remediation
 

  Justify the interventions you will use to quarantine and remediate the compromised machine using industry best practices. Record your responses in the attached “NOC Reporting Template.”

 
Recommendations
 

  Recommend bothadministrative controls and technical controls that the NOC could apply to prevent or limit the damage from a similar incident in the future. Record your recommendations in the attached “NOC Reporting Template.”

 

  Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

 

   Demonstrate professional communication in the content and presentation of your submission.

Assignment status: Solved by our experts

>>>Click here to get this paper written at the best price. 100% Custom, 0% plagiarism.<<<

Leave a Reply

Your email address will not be published. Required fields are marked *